CIA DirectorMike Pompeo said Saturday that PresidentDonald Trump's prolific Twitter feed was yielding valuable intelligence.
"I've actually seen it help us," Pompeo told the audience at The Reagan NationalDefenseForum in Simi Valley, California, when asked whether Trump's Twitter activity was making his job harder.
"I have seen things the President has put on his Twitter account actually have a real-world impact on our capacity to understand what's going on in other places of the world," Pompeo said.
"Our adversaries responded to those tweets in ways that were helpful to us to understand command and control issues, who's listening to what messages, how those messages are resonating around the world," he added.
But one of Pompeo's predecessors, former CIA Director Leon Panetta, offered a contrasting opinion, taking issue with the President's tweets, particularly ones that some have labeled as anti-Muslim.

published:04 Dec 2017

views:15

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Somalia are riskier than the White House's more common use of drones to target terrorists, but the operations allow U.S. authorities to gather valuable intelligence, security analysts say.
"The President has made clear our preference for capturing terrorist targets when possible ... in order to elicit as much valuable intelligence as we can and bring a dangerous terrorist to justice," National Security Council spokeswoman Caitlin Hayden said in a statement.
In Libya, U.S. commandos on Saturday captured Abu Anas al-Libi, who was wanted in connection with the 1998 attacks on U.S. embassies in Kenya and Tanzania.

published:07 Oct 2013

views:3

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

published:01 Feb 2018

views:5355

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

published:14 Jan 2017

views:3419

See why more than 500 banks and credit unions trust March Networks video surveillance solutions to enhance security, protect their assets and improve branch performance. This powerful suite of video surveillance products help financial institutions proactively target fraud, skimming and other crimes with high quality video evidence and intelligent software tools. Lightning-fast search capabilities help you find evidence quickly, cutting investigation times and costs.

published:20 Oct 2017

views:11

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

published:11 Dec 2015

views:12868

The OxnardPolice Department is asking community members, “What if YOU could help solve a crime? What if YOU could provide valuable intelligence to detectives and help close a case?”
This morning, your Oxnard Police Department launched two new ways to facilitate media collection and storage of potential evidence.

published:05 Jan 2018

views:132

World top 10 Best intelligence Agencies
An intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence to protect the national debts.
The intelligence agencies help country to cope with security matters and to protect the nation from likely security breach; the core purpose of spy agencies is collection of secret information to secure the country from any internal and external happening which harm the stability of state either economically or politically.
The intelligence agencies also provide indirect security to tangible and intangible infrastructure of the country like nuclear program or any document containing sensitive information.
Personnel of any intelligence agency has been called agents, spies or undercover officers who vowed to devote his life and worked as secret agent for the state. Here are top 10 intelligence agencies of 2015 are given which are working in present for its respective countries to lock the safety of nation

WORLDWAR II SECOND WORLD WAR VIDEOS
The beginnings of MI5 (British Security Service) in World War II were not promising. The service was understaffed and overworked. The services long time inept director VernonHall was sacked and eventually replaced by David Petrie. With Operation Sea lion (The 1940 invasion of Great Britain) scrubbed by the Whermacht, MI5 would turn its organization into a highly valuable intelligence asset. And with MI6 and Bletchley Park, Great Britains intelligence network completely tricked the Abwher, SS SD and the German High Command throughout World War II.
MI5 implemented was to be called the double cross system. Any captured agent was given the opportunity to transmit messages, under MI5 direction, back to Germany or be handed over to the British military to be hung or shot. Of the 115 agents captured by the British all were captured. Fifteen were turned over to the military and hung. Committees were then set up to control information that was feed back to the Abwehr through the crossed agent. The information had to seem valuable and accurate. Pieces of truths were mixed in with half truths to manipulate the agents controller. No other MI5 operation proved more valuable than that of agent GARBO.
Amazingly enough GARBO was Spanish and not British. Juan Pujol (GARBO) was born in Spain in 1912. He fought during the Spanish Civil War against the Francos fascists. His loathing of Nazism grew from his deep hatred of the Spanish fascists. He was determined to inflict as much damage to Nazi Germany as humanly possible. At first the British denied Pujol any opportunity to assist their efforts. Pujol came up with the brilliant idea of appearing to cooperate with Nazi Germany. The Germans trained Pujol in spy craft and shipped him off to Britain. Pujol never entered Britain but began to send back detailed reports of Britain from Portugal. German intelligence was much impressed by Pujols faked reports. His reports were laced with information obtained from the local library. When British intelligence reviewed his material they were shocked at the depth Pujols had tricked the Abwehr. Equally impressive was Pujols ability to conjure up information that seemed valuable and fooled trained German agents.
By 1944 GARBOs network seemed gigantic, to the Abwehr. GARBO and MI5 had built up a system of 7 key agents. These key agents had 19 sub-agents. Along with GARBO the Abwehr believed they controlled 27 agents. The main goal of MI5 was to manipulate the German Abwehr into thinking the main Allied attack would come at the Pas-de-Calais. The real trick of feeding the Abwehr information was to place real information with fiction. On June 6th, 1944 at 0300, GARBO transmitted information that the landings in Normandy were merely an elaborate rouse. The German receiver station had missed the first transmission at 0300. With the landings beginning the information was already unusable. Many in the German High Command, including Field Marshall von Rundstedt fell for the scheme. GARBOs value to Abwehr was so great that Hitler awarded GARBO the Iron Cross.
Along with many British intelligence operations the true geniuses and masters of the game of deception died with their secrets. Juan Pujol García died in Venezuela in 1988.

Intelligence is most widely studied in humans, but has also been observed in non-human animals and in plants. Artificial intelligence is intelligence in machines. (i.e., software)

Within the discipline of psychology, various approaches to human intelligence have been adopted. The psychometric approach is especially familiar to the general public, as well as being the most researched and by far the most widely used in practical settings.

History of the term

Intelligence derives from the Latin verb intelligere, to comprehend or perceive. A form of this verb, intellectus, became the medieval technical term for understanding, and a translation for the Greek philosophical term nous. This term was however strongly linked to the metaphysical and cosmological theories of teleologicalscholasticism, including theories of the immortality of the soul, and the concept of the Active Intellect (also known as the Active Intelligence). This entire approach to the study of nature was strongly rejected by the early modern philosophers such as Francis Bacon, Thomas Hobbes, John Locke, and David Hume, all of whom preferred the word "understanding" in their English philosophical works. Hobbes for example, in his Latin De Corpore, used "intellectus intelligit" (translated in the English version as "the understanding understandeth") as a typical example of a logical absurdity. The term "intelligence" has therefore become less common in English language philosophy, but it has later been taken up (with the scholastic theories which it now implies) in more contemporary psychology.

CIA director: Trump tweets yielding valuable intelligence

CIA DirectorMike Pompeo said Saturday that PresidentDonald Trump's prolific Twitter feed was yielding valuable intelligence.
"I've actually seen it help us," Pompeo told the audience at The Reagan NationalDefenseForum in Simi Valley, California, when asked whether Trump's Twitter activity was making his job harder.
"I have seen things the President has put on his Twitter account actually have a real-world impact on our capacity to understand what's going on in other places of the world," Pompeo said.
"Our adversaries responded to those tweets in ways that were helpful to us to understand command and control issues, who's listening to what messages, how those messages are resonating around the world," he added.
But one of Pompeo's predecessors, former CIA Director Leon Panetta, offered a contrasting opinion, taking issue with the President's tweets, particularly ones that some have labeled as anti-Muslim.

0:48

U S raids risky but yield valuable intelligence

U S raids risky but yield valuable intelligence

U S raids risky but yield valuable intelligence

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Somalia are riskier than the White House's more common use of drones to target terrorists, but the operations allow U.S. authorities to gather valuable intelligence, security analysts say.
"The President has made clear our preference for capturing terrorist targets when possible ... in order to elicit as much valuable intelligence as we can and bring a dangerous terrorist to justice," National Security Council spokeswoman Caitlin Hayden said in a statement.
In Libya, U.S. commandos on Saturday captured Abu Anas al-Libi, who was wanted in connection with the 1998 attacks on U.S. embassies in Kenya and Tanzania.

1:01:29

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

20:57

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

55:17

Cut fraudulent losses and gather valuable video based business intelligence in Fina

Cut fraudulent losses and gather valuable video based business intelligence in Fina

Cut fraudulent losses and gather valuable video based business intelligence in Fina

See why more than 500 banks and credit unions trust March Networks video surveillance solutions to enhance security, protect their assets and improve branch performance. This powerful suite of video surveillance products help financial institutions proactively target fraud, skimming and other crimes with high quality video evidence and intelligent software tools. Lightning-fast search capabilities help you find evidence quickly, cutting investigation times and costs.

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

1:14

registrationaxon 1

registrationaxon 1

registrationaxon 1

The OxnardPolice Department is asking community members, “What if YOU could help solve a crime? What if YOU could provide valuable intelligence to detectives and help close a case?”
This morning, your Oxnard Police Department launched two new ways to facilitate media collection and storage of potential evidence.

3:28

Top 10 Best Intelligence Agencies In The World 2016

Top 10 Best Intelligence Agencies In The World 2016

Top 10 Best Intelligence Agencies In The World 2016

World top 10 Best intelligence Agencies
An intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence to protect the national debts.
The intelligence agencies help country to cope with security matters and to protect the nation from likely security breach; the core purpose of spy agencies is collection of secret information to secure the country from any internal and external happening which harm the stability of state either economically or politically.
The intelligence agencies also provide indirect security to tangible and intangible infrastructure of the country like nuclear program or any document containing sensitive information.
Personnel of any intelligence agency has been called agents, spies or undercover officers who vowed to devote his life and worked as secret agent for the state. Here are top 10 intelligence agencies of 2015 are given which are working in present for its respective countries to lock the safety of nation

Boston terror Valuable intelligence lost

10:01

(1/5) Timewatch The Spies that Fooled Hitler World War II

(1/5) Timewatch The Spies that Fooled Hitler World War II

(1/5) Timewatch The Spies that Fooled Hitler World War II

WORLDWAR II SECOND WORLD WAR VIDEOS
The beginnings of MI5 (British Security Service) in World War II were not promising. The service was understaffed and overworked. The services long time inept director VernonHall was sacked and eventually replaced by David Petrie. With Operation Sea lion (The 1940 invasion of Great Britain) scrubbed by the Whermacht, MI5 would turn its organization into a highly valuable intelligence asset. And with MI6 and Bletchley Park, Great Britains intelligence network completely tricked the Abwher, SS SD and the German High Command throughout World War II.
MI5 implemented was to be called the double cross system. Any captured agent was given the opportunity to transmit messages, under MI5 direction, back to Germany or be handed over to the British military to be hung or shot. Of the 115 agents captured by the British all were captured. Fifteen were turned over to the military and hung. Committees were then set up to control information that was feed back to the Abwehr through the crossed agent. The information had to seem valuable and accurate. Pieces of truths were mixed in with half truths to manipulate the agents controller. No other MI5 operation proved more valuable than that of agent GARBO.
Amazingly enough GARBO was Spanish and not British. Juan Pujol (GARBO) was born in Spain in 1912. He fought during the Spanish Civil War against the Francos fascists. His loathing of Nazism grew from his deep hatred of the Spanish fascists. He was determined to inflict as much damage to Nazi Germany as humanly possible. At first the British denied Pujol any opportunity to assist their efforts. Pujol came up with the brilliant idea of appearing to cooperate with Nazi Germany. The Germans trained Pujol in spy craft and shipped him off to Britain. Pujol never entered Britain but began to send back detailed reports of Britain from Portugal. German intelligence was much impressed by Pujols faked reports. His reports were laced with information obtained from the local library. When British intelligence reviewed his material they were shocked at the depth Pujols had tricked the Abwehr. Equally impressive was Pujols ability to conjure up information that seemed valuable and fooled trained German agents.
By 1944 GARBOs network seemed gigantic, to the Abwehr. GARBO and MI5 had built up a system of 7 key agents. These key agents had 19 sub-agents. Along with GARBO the Abwehr believed they controlled 27 agents. The main goal of MI5 was to manipulate the German Abwehr into thinking the main Allied attack would come at the Pas-de-Calais. The real trick of feeding the Abwehr information was to place real information with fiction. On June 6th, 1944 at 0300, GARBO transmitted information that the landings in Normandy were merely an elaborate rouse. The German receiver station had missed the first transmission at 0300. With the landings beginning the information was already unusable. Many in the German High Command, including Field Marshall von Rundstedt fell for the scheme. GARBOs value to Abwehr was so great that Hitler awarded GARBO the Iron Cross.
Along with many British intelligence operations the true geniuses and masters of the game of deception died with their secrets. Juan Pujol García died in Venezuela in 1988.

CIA director: Trump tweets yielding valuable intelligence

CIA DirectorMike Pompeo said Saturday that PresidentDonald Trump's prolific Twitter feed was yielding valuable intelligence.
"I've actually seen it help us," Pompeo told the audience at The Reagan NationalDefenseForum in Simi Valley, California, when asked whether Trump's Twitter activity was making his job harder.
"I have seen things the President has put on his Twitter account actually have a real-world impact on our capacity to understand what's going on in other places of the world," Pompeo said.
"Our adversaries responded to those tweets in ways that were helpful to us to understand command and control issues, who's listening to what messages, how those messages are resonating around the world," he added.
But one of Pompeo's predecessors, former CIA Director Leon Panetta, offered...

published: 04 Dec 2017

U S raids risky but yield valuable intelligence

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Somalia are riskier than the White House's more common use of drones to target terrorists, but the operations allow U.S. authorities to gather valuable intelligence, security analysts say.
"The President has made clear our preference for capturing terrorist targets when possible ... in order to elicit as much valuable intelligence as we can and bring a dangerous terrorist to justice," National Security Council spokeswoman Caitlin Hayden said in a statement.
In Libya, U.S. commandos on Saturday captured Abu Anas al-Libi, who was wanted in connection with the 1998 attacks on U.S. embassies in Kenya and Tanzania.

published: 07 Oct 2013

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain s...

published: 01 Feb 2018

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US Nationa...

published: 14 Jan 2017

Cut fraudulent losses and gather valuable video based business intelligence in Fina

See why more than 500 banks and credit unions trust March Networks video surveillance solutions to enhance security, protect their assets and improve branch performance. This powerful suite of video surveillance products help financial institutions proactively target fraud, skimming and other crimes with high quality video evidence and intelligent software tools. Lightning-fast search capabilities help you find evidence quickly, cutting investigation times and costs.

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to ide...

published: 11 Dec 2015

registrationaxon 1

The OxnardPolice Department is asking community members, “What if YOU could help solve a crime? What if YOU could provide valuable intelligence to detectives and help close a case?”
This morning, your Oxnard Police Department launched two new ways to facilitate media collection and storage of potential evidence.

published: 05 Jan 2018

Top 10 Best Intelligence Agencies In The World 2016

World top 10 Best intelligence Agencies
An intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence to protect the national debts.
The intelligence agencies help country to cope with security matters and to protect the nation from likely security breach; the core purpose of spy agencies is collection of secret information to secure the country from any internal and external happening which harm the stability of state either economically or politically.
The intelligence agencies also provide indirect security to tangible and intangible infrastructure of the country like nuclear program or any document containing sensitive information.
Personnel of any intelligence agency has been called agents, spies or undercover of...

CIA DirectorMike Pompeo said Saturday that PresidentDonald Trump's prolific Twitter feed was yielding valuable intelligence.
"I've actually seen it help us," Pompeo told the audience at The Reagan NationalDefenseForum in Simi Valley, California, when asked whether Trump's Twitter activity was making his job harder.
"I have seen things the President has put on his Twitter account actually have a real-world impact on our capacity to understand what's going on in other places of the world," Pompeo said.
"Our adversaries responded to those tweets in ways that were helpful to us to understand command and control issues, who's listening to what messages, how those messages are resonating around the world," he added.
But one of Pompeo's predecessors, former CIA Director Leon Panetta, offered a contrasting opinion, taking issue with the President's tweets, particularly ones that some have labeled as anti-Muslim.

CIA DirectorMike Pompeo said Saturday that PresidentDonald Trump's prolific Twitter feed was yielding valuable intelligence.
"I've actually seen it help us," Pompeo told the audience at The Reagan NationalDefenseForum in Simi Valley, California, when asked whether Trump's Twitter activity was making his job harder.
"I have seen things the President has put on his Twitter account actually have a real-world impact on our capacity to understand what's going on in other places of the world," Pompeo said.
"Our adversaries responded to those tweets in ways that were helpful to us to understand command and control issues, who's listening to what messages, how those messages are resonating around the world," he added.
But one of Pompeo's predecessors, former CIA Director Leon Panetta, offered a contrasting opinion, taking issue with the President's tweets, particularly ones that some have labeled as anti-Muslim.

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Somalia are riskier than the White House's more common use of drones to target terrorists, but the operations allow U.S. authorities to gather valuable intelligence, security analysts say.
"The President has made clear our preference for capturing terrorist targets when possible ... in order to elicit as much valuable intelligence as we can and bring a dangerous terrorist to justice," National Security Council spokeswoman Caitlin Hayden said in a statement.
In Libya, U.S. commandos on Saturday captured Abu Anas al-Libi, who was wanted in connection with the 1998 attacks on U.S. embassies in Kenya and Tanzania.

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Somalia are riskier than the White House's more common use of drones to target terrorists, but the operations allow U.S. authorities to gather valuable intelligence, security analysts say.
"The President has made clear our preference for capturing terrorist targets when possible ... in order to elicit as much valuable intelligence as we can and bring a dangerous terrorist to justice," National Security Council spokeswoman Caitlin Hayden said in a statement.
In Libya, U.S. commandos on Saturday captured Abu Anas al-Libi, who was wanted in connection with the 1998 attacks on U.S. embassies in Kenya and Tanzania.

published:07 Oct 2013

views:3

back

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intel...

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

published:01 Feb 2018

views:5355

back

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

published:14 Jan 2017

views:3419

back

Cut fraudulent losses and gather valuable video based business intelligence in Fina

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. T...

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

The OxnardPolice Department is asking community members, “What if YOU could help solve a crime? What if YOU could provide valuable intelligence to detectives and help close a case?”
This morning, your Oxnard Police Department launched two new ways to facilitate media collection and storage of potential evidence.

The OxnardPolice Department is asking community members, “What if YOU could help solve a crime? What if YOU could provide valuable intelligence to detectives and help close a case?”
This morning, your Oxnard Police Department launched two new ways to facilitate media collection and storage of potential evidence.

World top 10 Best intelligence Agencies
An intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence to protect the national debts.
The intelligence agencies help country to cope with security matters and to protect the nation from likely security breach; the core purpose of spy agencies is collection of secret information to secure the country from any internal and external happening which harm the stability of state either economically or politically.
The intelligence agencies also provide indirect security to tangible and intangible infrastructure of the country like nuclear program or any document containing sensitive information.
Personnel of any intelligence agency has been called agents, spies or undercover officers who vowed to devote his life and worked as secret agent for the state. Here are top 10 intelligence agencies of 2015 are given which are working in present for its respective countries to lock the safety of nation

World top 10 Best intelligence Agencies
An intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence to protect the national debts.
The intelligence agencies help country to cope with security matters and to protect the nation from likely security breach; the core purpose of spy agencies is collection of secret information to secure the country from any internal and external happening which harm the stability of state either economically or politically.
The intelligence agencies also provide indirect security to tangible and intangible infrastructure of the country like nuclear program or any document containing sensitive information.
Personnel of any intelligence agency has been called agents, spies or undercover officers who vowed to devote his life and worked as secret agent for the state. Here are top 10 intelligence agencies of 2015 are given which are working in present for its respective countries to lock the safety of nation

WORLDWAR II SECOND WORLD WAR VIDEOS
The beginnings of MI5 (British Security Service) in World War II were not promising. The service was understaffed and overworked. The services long time inept director VernonHall was sacked and eventually replaced by David Petrie. With Operation Sea lion (The 1940 invasion of Great Britain) scrubbed by the Whermacht, MI5 would turn its organization into a highly valuable intelligence asset. And with MI6 and Bletchley Park, Great Britains intelligence network completely tricked the Abwher, SS SD and the German High Command throughout World War II.
MI5 implemented was to be called the double cross system. Any captured agent was given the opportunity to transmit messages, under MI5 direction, back to Germany or be handed over to the British military to be hung or shot. Of the 115 agents captured by the British all were captured. Fifteen were turned over to the military and hung. Committees were then set up to control information that was feed back to the Abwehr through the crossed agent. The information had to seem valuable and accurate. Pieces of truths were mixed in with half truths to manipulate the agents controller. No other MI5 operation proved more valuable than that of agent GARBO.
Amazingly enough GARBO was Spanish and not British. Juan Pujol (GARBO) was born in Spain in 1912. He fought during the Spanish Civil War against the Francos fascists. His loathing of Nazism grew from his deep hatred of the Spanish fascists. He was determined to inflict as much damage to Nazi Germany as humanly possible. At first the British denied Pujol any opportunity to assist their efforts. Pujol came up with the brilliant idea of appearing to cooperate with Nazi Germany. The Germans trained Pujol in spy craft and shipped him off to Britain. Pujol never entered Britain but began to send back detailed reports of Britain from Portugal. German intelligence was much impressed by Pujols faked reports. His reports were laced with information obtained from the local library. When British intelligence reviewed his material they were shocked at the depth Pujols had tricked the Abwehr. Equally impressive was Pujols ability to conjure up information that seemed valuable and fooled trained German agents.
By 1944 GARBOs network seemed gigantic, to the Abwehr. GARBO and MI5 had built up a system of 7 key agents. These key agents had 19 sub-agents. Along with GARBO the Abwehr believed they controlled 27 agents. The main goal of MI5 was to manipulate the German Abwehr into thinking the main Allied attack would come at the Pas-de-Calais. The real trick of feeding the Abwehr information was to place real information with fiction. On June 6th, 1944 at 0300, GARBO transmitted information that the landings in Normandy were merely an elaborate rouse. The German receiver station had missed the first transmission at 0300. With the landings beginning the information was already unusable. Many in the German High Command, including Field Marshall von Rundstedt fell for the scheme. GARBOs value to Abwehr was so great that Hitler awarded GARBO the Iron Cross.
Along with many British intelligence operations the true geniuses and masters of the game of deception died with their secrets. Juan Pujol García died in Venezuela in 1988.

WORLDWAR II SECOND WORLD WAR VIDEOS
The beginnings of MI5 (British Security Service) in World War II were not promising. The service was understaffed and overworked. The services long time inept director VernonHall was sacked and eventually replaced by David Petrie. With Operation Sea lion (The 1940 invasion of Great Britain) scrubbed by the Whermacht, MI5 would turn its organization into a highly valuable intelligence asset. And with MI6 and Bletchley Park, Great Britains intelligence network completely tricked the Abwher, SS SD and the German High Command throughout World War II.
MI5 implemented was to be called the double cross system. Any captured agent was given the opportunity to transmit messages, under MI5 direction, back to Germany or be handed over to the British military to be hung or shot. Of the 115 agents captured by the British all were captured. Fifteen were turned over to the military and hung. Committees were then set up to control information that was feed back to the Abwehr through the crossed agent. The information had to seem valuable and accurate. Pieces of truths were mixed in with half truths to manipulate the agents controller. No other MI5 operation proved more valuable than that of agent GARBO.
Amazingly enough GARBO was Spanish and not British. Juan Pujol (GARBO) was born in Spain in 1912. He fought during the Spanish Civil War against the Francos fascists. His loathing of Nazism grew from his deep hatred of the Spanish fascists. He was determined to inflict as much damage to Nazi Germany as humanly possible. At first the British denied Pujol any opportunity to assist their efforts. Pujol came up with the brilliant idea of appearing to cooperate with Nazi Germany. The Germans trained Pujol in spy craft and shipped him off to Britain. Pujol never entered Britain but began to send back detailed reports of Britain from Portugal. German intelligence was much impressed by Pujols faked reports. His reports were laced with information obtained from the local library. When British intelligence reviewed his material they were shocked at the depth Pujols had tricked the Abwehr. Equally impressive was Pujols ability to conjure up information that seemed valuable and fooled trained German agents.
By 1944 GARBOs network seemed gigantic, to the Abwehr. GARBO and MI5 had built up a system of 7 key agents. These key agents had 19 sub-agents. Along with GARBO the Abwehr believed they controlled 27 agents. The main goal of MI5 was to manipulate the German Abwehr into thinking the main Allied attack would come at the Pas-de-Calais. The real trick of feeding the Abwehr information was to place real information with fiction. On June 6th, 1944 at 0300, GARBO transmitted information that the landings in Normandy were merely an elaborate rouse. The German receiver station had missed the first transmission at 0300. With the landings beginning the information was already unusable. Many in the German High Command, including Field Marshall von Rundstedt fell for the scheme. GARBOs value to Abwehr was so great that Hitler awarded GARBO the Iron Cross.
Along with many British intelligence operations the true geniuses and masters of the game of deception died with their secrets. Juan Pujol García died in Venezuela in 1988.

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain s...

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to ide...

PF06g Valuable Brains - Emotional intelligence EQ

RUSSIAN INTELLIGENCE: KGB Interrogation Methods (720p)

Cut fraudulent losses and gather valuable video based business intelligence in Fina

See why more than 500 banks and credit unions trust March Networks video surveillance solutions to enhance security, protect their assets and improve branch performance. This powerful suite of video surveillance products help financial institutions proactively target fraud, skimming and other crimes with high quality video evidence and intelligent software tools. Lightning-fast search capabilities help you find evidence quickly, cutting investigation times and costs.

published: 20 Oct 2017

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US Nationa...

published: 14 Jan 2017

Ambassador Henry Crumpton - The Art of Intelligence: Lessons From a Life in the CIA...

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAVPredator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the GC&CS at Bletchley Park. About the book: https://www.amazon.com/gp/product/0375761268/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0375761268&linkCode=as2&tag=tra0c7-20&linkId=e5c10a428fa38bc04103154f936b1233
Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence thus obtained was considered more important than that designated by the highest British security classification then used (Most Secret) and so was regarded as being Ultra secret. Several other cryptonyms had been used for such inte...

published: 07 Oct 2015

Sharing Secrets: Obstacles and Solutions to International Intelligence Sharing

Newly recruited intelligence officers are taught that there are no friendly intelligence agencies, only intelligence agencies of friendly countries. This old adage still rings true, yet intelligence sharing between these unfriendly agencies is more important and more developed today than ever. Whether it's about fighting terrorism or WMD proliferation, intelligence agencies are sharing information and cooperating to an unprecedented degree. How effective is this cooperation? What can promote it and increase it? Where does it stop?
New America is pleased to welcome our keynote speaker Gen. (ret.) Michael Hayden, former Director of the Central Intelligence Agency and of the National Security Agency; as well as Dr. David Gioe, a former FBI and CIA officer now Assistant Professor at West Poin...

Yuval Noah Harari, the author of Sapiens and Homo Deus, explores the long history of inequality – from the Stone Age onwards – and asks whether we are on the brink of creating a huge “economically useless” underclass, unable to keep up with enhanced humans, the owners of increasingly valuable data and, eventually, artificial intelligence.
April 2017

published: 16 Dec 2017

HOW ARTIFICIAL INTELLIGENCE CHANGING THE WORLD

SDS 067: Latest Developments in the Field of AI and How it is Changing the World
In this episode of the SuperDataScience Podcast, I chat with Vice President of Research at Sentient AI, Risto Miikkulainen. You will discuss about the applications of AI across multiple fields, learn about the 2 types of AI - the Evolutionary Algorithms and Reinforcement Learning Algorithms, and also get valuable insights on how AI is changing the employment landscape.
If you enjoyed this episode, check out show notes, resources, and more at http://www.superdatascience.com/67

published: 06 Jul 2017

Collecting Valuable Deal Intelligence Using ShareVault

Find out how a good Virtual Data Room can provide valuable deal intelligence: http://www.sharevault.com/product/features
First, a good data room gives you detailed control over who sees which documents:
* Quickly set up specific users and groups and fine-tune access permissions for each (view only, print, or download)
* Place the same document in multiple places in your organizational hierarchy without the need to replicate the document
And second, a good data room provides detailed reports:
* Identify how much time users and groups spend looking at each page of your documents
* Track the path users take through documents in your data room

In a society where brilliance, degrees, and pedigree reign, there is a uniquely human skill set that many don’t know exists, let alone understand or value: Emotional Intelligence. JoelleHadley will teach us what EI is, how valuable it can be in helping us show up as our best selves, and inspire us to spread Emotional Intelligence.
Joelle Hadley is the founder and president of The Culture Coaches, and she is passionate about creating more positive and productive work places where people love their work and love their lives. Her media and leadership career includes 21 years of marketing, sales, and publishing leadership with American City Business Journals, the nation’s largest publisher of weekly business newspapers. Joelle was also the face and voice of local business news on the NBC a...

In this episode of the Waking Up podcast, Sam Harris speaks with Max Tegmark about his new book Life3.0: Being Human in the Age of Artificial Intelligence. They talk about the nature of intelligence, the risks of superhuman AI, a nonbiological definition of life, the substrate independence of minds, the relevance and irrelevance of consciousness for the future of AI, near-term breakthroughs in AI, and other topics.
Max Tegmark is a professor of physics at MIT and the co-founder of the Future of Life Institute. Tegmark has been featured in dozens of science documentaries. He is the author of Our Mathematical Universe and Life 3.0: Being Human in the Age of Artificial Intelligence.
Twitter: @Tegmark
Discuss this in the forums
Do you find the Waking Up podcast valuable?
You can support...

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intel...

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. T...

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

published:14 Jan 2017

views:3419

back

Ambassador Henry Crumpton - The Art of Intelligence: Lessons From a Life in the CIA...

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is m...

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAVPredator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAVPredator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy...

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the GC&CS at Bletchley Park. About the book: https://www.amazon.com/gp/product/0375761268/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0375761268&linkCode=as2&tag=tra0c7-20&linkId=e5c10a428fa38bc04103154f936b1233
Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence thus obtained was considered more important than that designated by the highest British security classification then used (Most Secret) and so was regarded as being Ultra secret. Several other cryptonyms had been used for such intelligence. British intelligence first designated it Boniface—presumably to imply that it was the result of human intelligence. The U.S. used the codename Magic for its decrypts from Japanese sources.
Much of the German cipher traffic was encrypted on the Enigma machine. Used properly, the German militaryEnigma would have been virtually unbreakable; in practice, shortcomings in operation allowed it to be broken. The term "Ultra" has often been used almost synonymously with "Enigma decrypts". However, Ultra also encompassed decrypts of the German Lorenz SZ 40/42 machines that were used by the German High Command, and the Hagelin machine[a] and other Italian and Japanese ciphers and codes such as PURPLE and JN-25.
Many observers, at the time and later, regarded Ultra as immensely valuable to the Allies. Winston Churchill was reported to have told King George VI, when presenting to him Stewart Menzies (head of the Secret Intelligence Service and the person who controlled distribution of Ultra decrypts to the government): "It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!" F. W. Winterbotham quoted the western Supreme Allied Commander, Dwight D. Eisenhower, at war's end describing Ultra as having been "decisive" to Allied victory. Sir Harry Hinsley, Bletchley Park veteran and official historian of British Intelligence in World War II, made a similar assessment about Ultra, saying that it shortened the war "by not less than two years and probably by four years"; and that, in the absence of Ultra, it is uncertain how the war would have ended.
Since Ultra was revealed in the middle 1970s, historians have altered the historiography of World War II. For example, Andrew Roberts, writing in the 21st century, states, "Because of the invaluable advantage of being able to read Rommel's Enigma communications, Montgomery knew how short the Germans were of men, ammunition, food and above all fuel. When he put Rommel's picture up in his caravan he wanted to be seen to be almost reading his opponent's mind. In fact he was reading his mail".
There has been controversy about the influence of Allied Enigma decryption on the course of World War II. It has also been suggested that the question should be broadened to include Ultra's influence not only on the war itself, but also on the post-war period.
F. W. Winterbotham, the first author to outline the influence of Enigma decryption on the course of World War II, likewise made the earliest contribution to an appreciation of Ultra's postwar influence, which now continues into the 21st Century — and not only in the postwar establishment of Britain's GCHQ (Government Communication Headquarters) and America's NSA. "Let no one be fooled," Winterbotham admonishes in chapter 3, "by the spate of television films and propaganda which has made the war seem like some great triumphant epic. It was, in fact, a very narrow shave, and the reader may like to ponder [...] whether [...] we might have won [without] Ultra."
Debate continues on whether, had postwar political and military leaders been aware of Ultra's role in Allied victory in World War II, these leaders might have been less optimistic about post-World War II military involvements.
Knightley suggests that Ultra may have contributed to the development of the Cold War. The Soviets received disguised Ultra information, but the existence of Ultra itself was not disclosed by the western Allies. The Soviets, who had clues to Ultra's existence, possibly through Kim Philby and Anthony Blunt, may thus have felt still more distrustful of their wartime partners.
The mystery surrounding the discovery of the sunk U-869 off the coast of New Jersey by divers Richie Kohler and John Chatterton was unraveled in part through the analysis of Ultra intercepts, which demonstrated that, although U-869 had been ordered by U-boat Command to change course and proceed to North Africa, near Rabat, the submarine had missed the messages changing her assignment and had continued to the eastern coast of the U.S., her original destination.
https://en.wikipedia.org/wiki/Ultra

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the GC&CS at Bletchley Park. About the book: https://www.amazon.com/gp/product/0375761268/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0375761268&linkCode=as2&tag=tra0c7-20&linkId=e5c10a428fa38bc04103154f936b1233
Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence thus obtained was considered more important than that designated by the highest British security classification then used (Most Secret) and so was regarded as being Ultra secret. Several other cryptonyms had been used for such intelligence. British intelligence first designated it Boniface—presumably to imply that it was the result of human intelligence. The U.S. used the codename Magic for its decrypts from Japanese sources.
Much of the German cipher traffic was encrypted on the Enigma machine. Used properly, the German militaryEnigma would have been virtually unbreakable; in practice, shortcomings in operation allowed it to be broken. The term "Ultra" has often been used almost synonymously with "Enigma decrypts". However, Ultra also encompassed decrypts of the German Lorenz SZ 40/42 machines that were used by the German High Command, and the Hagelin machine[a] and other Italian and Japanese ciphers and codes such as PURPLE and JN-25.
Many observers, at the time and later, regarded Ultra as immensely valuable to the Allies. Winston Churchill was reported to have told King George VI, when presenting to him Stewart Menzies (head of the Secret Intelligence Service and the person who controlled distribution of Ultra decrypts to the government): "It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!" F. W. Winterbotham quoted the western Supreme Allied Commander, Dwight D. Eisenhower, at war's end describing Ultra as having been "decisive" to Allied victory. Sir Harry Hinsley, Bletchley Park veteran and official historian of British Intelligence in World War II, made a similar assessment about Ultra, saying that it shortened the war "by not less than two years and probably by four years"; and that, in the absence of Ultra, it is uncertain how the war would have ended.
Since Ultra was revealed in the middle 1970s, historians have altered the historiography of World War II. For example, Andrew Roberts, writing in the 21st century, states, "Because of the invaluable advantage of being able to read Rommel's Enigma communications, Montgomery knew how short the Germans were of men, ammunition, food and above all fuel. When he put Rommel's picture up in his caravan he wanted to be seen to be almost reading his opponent's mind. In fact he was reading his mail".
There has been controversy about the influence of Allied Enigma decryption on the course of World War II. It has also been suggested that the question should be broadened to include Ultra's influence not only on the war itself, but also on the post-war period.
F. W. Winterbotham, the first author to outline the influence of Enigma decryption on the course of World War II, likewise made the earliest contribution to an appreciation of Ultra's postwar influence, which now continues into the 21st Century — and not only in the postwar establishment of Britain's GCHQ (Government Communication Headquarters) and America's NSA. "Let no one be fooled," Winterbotham admonishes in chapter 3, "by the spate of television films and propaganda which has made the war seem like some great triumphant epic. It was, in fact, a very narrow shave, and the reader may like to ponder [...] whether [...] we might have won [without] Ultra."
Debate continues on whether, had postwar political and military leaders been aware of Ultra's role in Allied victory in World War II, these leaders might have been less optimistic about post-World War II military involvements.
Knightley suggests that Ultra may have contributed to the development of the Cold War. The Soviets received disguised Ultra information, but the existence of Ultra itself was not disclosed by the western Allies. The Soviets, who had clues to Ultra's existence, possibly through Kim Philby and Anthony Blunt, may thus have felt still more distrustful of their wartime partners.
The mystery surrounding the discovery of the sunk U-869 off the coast of New Jersey by divers Richie Kohler and John Chatterton was unraveled in part through the analysis of Ultra intercepts, which demonstrated that, although U-869 had been ordered by U-boat Command to change course and proceed to North Africa, near Rabat, the submarine had missed the messages changing her assignment and had continued to the eastern coast of the U.S., her original destination.
https://en.wikipedia.org/wiki/Ultra

published:07 Oct 2015

views:3398

back

Sharing Secrets: Obstacles and Solutions to International Intelligence Sharing

Yuval Noah Harari, the author of Sapiens and Homo Deus, explores the long history of inequality – from the Stone Age onwards – and asks whether we are on the brink of creating a huge “economically useless” underclass, unable to keep up with enhanced humans, the owners of increasingly valuable data and, eventually, artificial intelligence.
April 2017

Yuval Noah Harari, the author of Sapiens and Homo Deus, explores the long history of inequality – from the Stone Age onwards – and asks whether we are on the brink of creating a huge “economically useless” underclass, unable to keep up with enhanced humans, the owners of increasingly valuable data and, eventually, artificial intelligence.
April 2017

SDS 067: Latest Developments in the Field of AI and How it is Changing the World
In this episode of the SuperDataScience Podcast, I chat with Vice President of Research at Sentient AI, Risto Miikkulainen. You will discuss about the applications of AI across multiple fields, learn about the 2 types of AI - the Evolutionary Algorithms and Reinforcement Learning Algorithms, and also get valuable insights on how AI is changing the employment landscape.
If you enjoyed this episode, check out show notes, resources, and more at http://www.superdatascience.com/67

SDS 067: Latest Developments in the Field of AI and How it is Changing the World
In this episode of the SuperDataScience Podcast, I chat with Vice President of Research at Sentient AI, Risto Miikkulainen. You will discuss about the applications of AI across multiple fields, learn about the 2 types of AI - the Evolutionary Algorithms and Reinforcement Learning Algorithms, and also get valuable insights on how AI is changing the employment landscape.
If you enjoyed this episode, check out show notes, resources, and more at http://www.superdatascience.com/67

Find out how a good Virtual Data Room can provide valuable deal intelligence: http://www.sharevault.com/product/features
First, a good data room gives you detailed control over who sees which documents:
* Quickly set up specific users and groups and fine-tune access permissions for each (view only, print, or download)
* Place the same document in multiple places in your organizational hierarchy without the need to replicate the document
And second, a good data room provides detailed reports:
* Identify how much time users and groups spend looking at each page of your documents
* Track the path users take through documents in your data room

Find out how a good Virtual Data Room can provide valuable deal intelligence: http://www.sharevault.com/product/features
First, a good data room gives you detailed control over who sees which documents:
* Quickly set up specific users and groups and fine-tune access permissions for each (view only, print, or download)
* Place the same document in multiple places in your organizational hierarchy without the need to replicate the document
And second, a good data room provides detailed reports:
* Identify how much time users and groups spend looking at each page of your documents
* Track the path users take through documents in your data room

In a society where brilliance, degrees, and pedigree reign, there is a uniquely human skill set that many don’t know exists, let alone understand or value: Emot...

In a society where brilliance, degrees, and pedigree reign, there is a uniquely human skill set that many don’t know exists, let alone understand or value: Emotional Intelligence. JoelleHadley will teach us what EI is, how valuable it can be in helping us show up as our best selves, and inspire us to spread Emotional Intelligence.
Joelle Hadley is the founder and president of The Culture Coaches, and she is passionate about creating more positive and productive work places where people love their work and love their lives. Her media and leadership career includes 21 years of marketing, sales, and publishing leadership with American City Business Journals, the nation’s largest publisher of weekly business newspapers. Joelle was also the face and voice of local business news on the NBC affiliate KPNX and on KTAR news-talk radio. She is an expert in communication and presentation skills, emotional intelligence, and personal performance. She is a master certified trainer in Emotional Intelligence from the Institute of Health and Human Potential and is also the Co-founder of The Southwest Institute for Emotional Intelligence. Joelle has inspired thousands of executives across the country with her many speeches and workshops centered on corporate culture, personal excellence, and lifestyle along with leadership.
This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx

In a society where brilliance, degrees, and pedigree reign, there is a uniquely human skill set that many don’t know exists, let alone understand or value: Emotional Intelligence. JoelleHadley will teach us what EI is, how valuable it can be in helping us show up as our best selves, and inspire us to spread Emotional Intelligence.
Joelle Hadley is the founder and president of The Culture Coaches, and she is passionate about creating more positive and productive work places where people love their work and love their lives. Her media and leadership career includes 21 years of marketing, sales, and publishing leadership with American City Business Journals, the nation’s largest publisher of weekly business newspapers. Joelle was also the face and voice of local business news on the NBC affiliate KPNX and on KTAR news-talk radio. She is an expert in communication and presentation skills, emotional intelligence, and personal performance. She is a master certified trainer in Emotional Intelligence from the Institute of Health and Human Potential and is also the Co-founder of The Southwest Institute for Emotional Intelligence. Joelle has inspired thousands of executives across the country with her many speeches and workshops centered on corporate culture, personal excellence, and lifestyle along with leadership.
This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx

In this episode of the Waking Up podcast, Sam Harris speaks with Max Tegmark about his new book Life3.0: Being Human in the Age of Artificial Intelligence. They talk about the nature of intelligence, the risks of superhuman AI, a nonbiological definition of life, the substrate independence of minds, the relevance and irrelevance of consciousness for the future of AI, near-term breakthroughs in AI, and other topics.
Max Tegmark is a professor of physics at MIT and the co-founder of the Future of Life Institute. Tegmark has been featured in dozens of science documentaries. He is the author of Our Mathematical Universe and Life 3.0: Being Human in the Age of Artificial Intelligence.
Twitter: @Tegmark
Discuss this in the forums
Do you find the Waking Up podcast valuable?
You can support the show directly at: https://samharris.org/subscribe
Supporters get access to Sam's "Ask Me Anything" episodes, advance tickets to live events, and other exclusive content.
More information at https://www.samharris.org
--
Subscribe to the podcast on YouTube: https://www.youtube.com/user/samharrisorg
Follow Sam on Twitter: https://twitter.com/samharrisorg
Follow Sam on Facebook: https://www.facebook.com/Samharrisorg/

In this episode of the Waking Up podcast, Sam Harris speaks with Max Tegmark about his new book Life3.0: Being Human in the Age of Artificial Intelligence. They talk about the nature of intelligence, the risks of superhuman AI, a nonbiological definition of life, the substrate independence of minds, the relevance and irrelevance of consciousness for the future of AI, near-term breakthroughs in AI, and other topics.
Max Tegmark is a professor of physics at MIT and the co-founder of the Future of Life Institute. Tegmark has been featured in dozens of science documentaries. He is the author of Our Mathematical Universe and Life 3.0: Being Human in the Age of Artificial Intelligence.
Twitter: @Tegmark
Discuss this in the forums
Do you find the Waking Up podcast valuable?
You can support the show directly at: https://samharris.org/subscribe
Supporters get access to Sam's "Ask Me Anything" episodes, advance tickets to live events, and other exclusive content.
More information at https://www.samharris.org
--
Subscribe to the podcast on YouTube: https://www.youtube.com/user/samharrisorg
Follow Sam on Twitter: https://twitter.com/samharrisorg
Follow Sam on Facebook: https://www.facebook.com/Samharrisorg/

CIA director: Trump tweets yielding valuable intelligence

CIA DirectorMike Pompeo said Saturday that PresidentDonald Trump's prolific Twitter feed was yielding valuable intelligence.
"I've actually seen it help us," Pompeo told the audience at The Reagan NationalDefenseForum in Simi Valley, California, when asked whether Trump's Twitter activity was making his job harder.
"I have seen things the President has put on his Twitter account actually have a real-world impact on our capacity to understand what's going on in other places of the world," Pompeo said.
"Our adversaries responded to those tweets in ways that were helpful to us to understand command and control issues, who's listening to what messages, how those messages are resonating around the world," he added.
But one of Pompeo's predecessors, former CIA Director Leon Panetta, offered a contrasting opinion, taking issue with the President's tweets, particularly ones that some have labeled as anti-Muslim.

0:48

U S raids risky but yield valuable intelligence

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Som...

U S raids risky but yield valuable intelligence

The U.S. raid that nabbed a senior al-Qaeda leader in Libya and a similar operation in Somalia are riskier than the White House's more common use of drones to target terrorists, but the operations allow U.S. authorities to gather valuable intelligence, security analysts say.
"The President has made clear our preference for capturing terrorist targets when possible ... in order to elicit as much valuable intelligence as we can and bring a dangerous terrorist to justice," National Security Council spokeswoman Caitlin Hayden said in a statement.
In Libya, U.S. commandos on Saturday captured Abu Anas al-Libi, who was wanted in connection with the 1998 attacks on U.S. embassies in Kenya and Tanzania.

1:01:29

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

20:57

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

55:17

Cut fraudulent losses and gather valuable video based business intelligence in Fina

See why more than 500 banks and credit unions trust March Networks video surveillance solu...

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

1:14

registrationaxon 1

The Oxnard Police Department is asking community members, “What if YOU could help solve a ...

registrationaxon 1

The OxnardPolice Department is asking community members, “What if YOU could help solve a crime? What if YOU could provide valuable intelligence to detectives and help close a case?”
This morning, your Oxnard Police Department launched two new ways to facilitate media collection and storage of potential evidence.

3:28

Top 10 Best Intelligence Agencies In The World 2016

World top 10 Best intelligence Agencies
An intelligence agency refers to a government inst...

Top 10 Best Intelligence Agencies In The World 2016

World top 10 Best intelligence Agencies
An intelligence agency refers to a government institution which collects, analyze and exploit valuable information and intelligence to protect the national debts.
The intelligence agencies help country to cope with security matters and to protect the nation from likely security breach; the core purpose of spy agencies is collection of secret information to secure the country from any internal and external happening which harm the stability of state either economically or politically.
The intelligence agencies also provide indirect security to tangible and intangible infrastructure of the country like nuclear program or any document containing sensitive information.
Personnel of any intelligence agency has been called agents, spies or undercover officers who vowed to devote his life and worked as secret agent for the state. Here are top 10 intelligence agencies of 2015 are given which are working in present for its respective countries to lock the safety of nation

(1/5) Timewatch The Spies that Fooled Hitler World War II

WORLDWAR II SECOND WORLD WAR VIDEOS
The beginnings of MI5 (British Security Service) in World War II were not promising. The service was understaffed and overworked. The services long time inept director VernonHall was sacked and eventually replaced by David Petrie. With Operation Sea lion (The 1940 invasion of Great Britain) scrubbed by the Whermacht, MI5 would turn its organization into a highly valuable intelligence asset. And with MI6 and Bletchley Park, Great Britains intelligence network completely tricked the Abwher, SS SD and the German High Command throughout World War II.
MI5 implemented was to be called the double cross system. Any captured agent was given the opportunity to transmit messages, under MI5 direction, back to Germany or be handed over to the British military to be hung or shot. Of the 115 agents captured by the British all were captured. Fifteen were turned over to the military and hung. Committees were then set up to control information that was feed back to the Abwehr through the crossed agent. The information had to seem valuable and accurate. Pieces of truths were mixed in with half truths to manipulate the agents controller. No other MI5 operation proved more valuable than that of agent GARBO.
Amazingly enough GARBO was Spanish and not British. Juan Pujol (GARBO) was born in Spain in 1912. He fought during the Spanish Civil War against the Francos fascists. His loathing of Nazism grew from his deep hatred of the Spanish fascists. He was determined to inflict as much damage to Nazi Germany as humanly possible. At first the British denied Pujol any opportunity to assist their efforts. Pujol came up with the brilliant idea of appearing to cooperate with Nazi Germany. The Germans trained Pujol in spy craft and shipped him off to Britain. Pujol never entered Britain but began to send back detailed reports of Britain from Portugal. German intelligence was much impressed by Pujols faked reports. His reports were laced with information obtained from the local library. When British intelligence reviewed his material they were shocked at the depth Pujols had tricked the Abwehr. Equally impressive was Pujols ability to conjure up information that seemed valuable and fooled trained German agents.
By 1944 GARBOs network seemed gigantic, to the Abwehr. GARBO and MI5 had built up a system of 7 key agents. These key agents had 19 sub-agents. Along with GARBO the Abwehr believed they controlled 27 agents. The main goal of MI5 was to manipulate the German Abwehr into thinking the main Allied attack would come at the Pas-de-Calais. The real trick of feeding the Abwehr information was to place real information with fiction. On June 6th, 1944 at 0300, GARBO transmitted information that the landings in Normandy were merely an elaborate rouse. The German receiver station had missed the first transmission at 0300. With the landings beginning the information was already unusable. Many in the German High Command, including Field Marshall von Rundstedt fell for the scheme. GARBOs value to Abwehr was so great that Hitler awarded GARBO the Iron Cross.
Along with many British intelligence operations the true geniuses and masters of the game of deception died with their secrets. Juan Pujol García died in Venezuela in 1988.

Amir Husain: "The Sentient Machine: The Coming Age of Artificial Intelligence" | Talks at Google

The SentientMachine addresses broad existential questions surrounding the coming of AI: Why are we valuable? What can we create in this world? How are we intelligent? What constitutes progress for us? And how might we fail to progress? Drawing on thinkers from Descartes to Turing, Husain responds to these questions with a dazzling yet realistic look at the future and provides an inspiring vision of the great changes now nearly upon us.
Amir Husain is an award-winning serial entrepreneur and inventor based in Austin, TX. He is the founder and CEO of SparkCognition, a company specializing in cognitive computing software solutions that help businesses and governments better respond to a world of ever-evolving threats, and he was a founding member of IBM's advisory board for Watson. Husain speaks at numerous SXSW, defense, cybersecurity, computer science, energy, and environmental conferences. His work, along with SparkCognition's work, has been featured in such publications as Fast Company, Wired, Forbes, and the New York Times. The Sentient Machine is his first book.
Get the book here: https://goo.gl/4ozyBM

Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know, these leaks are a valuable source of competitive intelligence. This talk describes how the speaker collects competitive intelligence for his own online retail business. Specifically, you learn how he combines, trends, and analyzes information within specific contexts to manufacture useful data that is real, but technically doesn't exist on it's own. For example, you will learn about the trade secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory, and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
Speaker Bio:
Michael Schrenk has presented six DEF CON talks on intelligence and organizational privacy, including last year's talk "You're Leaking Trade Secrets". He has developed Internet-based intelligence campaigns since 1995 for organizations as diverse as: Fortune 500 Companies, Private Investigators, Asian ArtDealers, and Investigative Journalists. His adventures in intelligence have taken him around the world, with speaking opportunities in The Middle East, Eastern Europe, The UK, Silicon Valley, and most places in between. Mike is also the author of "Webbots, Spiders, and Screen Scrapers (2007 & 2012, No Starch Press, San Francisco)". He is again teaming with No Starch Press to write a non-technical Intelligence and Counterintelligence book scheduled for publication in Q1 2016.

Military Intelligence Specialists 1961 US Army Training Film; G-2 at Work

Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4
US ArmyTrainingFilm playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3
more at http://quickfound.net/links/military_news_and_links.html
"This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection.
Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it.
US Army Training Film TF30-3030
Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound.
Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and one-pass brightness-contrast-color correction & mild video noise reduction applied.
The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original).
http://creativecommons.org/licenses/by-sa/3.0/
http://en.wikipedia.org/wiki/Military_intelligence
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other, broader areas of interest . Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself.
Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military intelligence capabilities will interact with civilian intelligence capabilities to inform the spectrum of political and military activities.
Personnel selected for intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training...
Many of the most important facts are well known, or may be gathered from public sources. This form of information collection is known as open source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public...
The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days, or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library.
A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of a country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs, in order to interpret munition shipments and inventories.
Most intelligence services maintain or support groups whose only purpose is to keep maps...
It is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.
It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence...
http://en.wikipedia.org/wiki/Defense_Intelligence_Agency
The DefenseIntelligence Agency (DIA) is a member of the Intelligence Community of the United States, and is the central producer and manager of military intelligence for the United States Department of Defense, employing over 16,500U.S. military and civilian employees worldwide. The Defense Intelligence Community is headed by the DIA... The DIA, designated in 1986 as a Defense Department combat support agency, was established in 1961 as a result of a decision by Secretary of DefenseRobert S. McNamara, under President John F. Kennedy. The Department of Defense created the DIA with the publication of Directive 5105.21, "Defense Intelligence Agency" on 1 August, effective 1 October 1961...

51:10

Ambassador Henry Crumpton - The Art of Intelligence: Lessons From a Life in the CIA...

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action ...

Ambassador Henry Crumpton - The Art of Intelligence: Lessons From a Life in the CIA...

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAVPredator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the GC&CS at Bletchley Park. About the book: https://www.amazon.com/gp/product/0375761268/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0375761268&linkCode=as2&tag=tra0c7-20&linkId=e5c10a428fa38bc04103154f936b1233
Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence thus obtained was considered more important than that designated by the highest British security classification then used (Most Secret) and so was regarded as being Ultra secret. Several other cryptonyms had been used for such intelligence. British intelligence first designated it Boniface—presumably to imply that it was the result of human intelligence. The U.S. used the codename Magic for its decrypts from Japanese sources.
Much of the German cipher traffic was encrypted on the Enigma machine. Used properly, the German militaryEnigma would have been virtually unbreakable; in practice, shortcomings in operation allowed it to be broken. The term "Ultra" has often been used almost synonymously with "Enigma decrypts". However, Ultra also encompassed decrypts of the German Lorenz SZ 40/42 machines that were used by the German High Command, and the Hagelin machine[a] and other Italian and Japanese ciphers and codes such as PURPLE and JN-25.
Many observers, at the time and later, regarded Ultra as immensely valuable to the Allies. Winston Churchill was reported to have told King George VI, when presenting to him Stewart Menzies (head of the Secret Intelligence Service and the person who controlled distribution of Ultra decrypts to the government): "It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!" F. W. Winterbotham quoted the western Supreme Allied Commander, Dwight D. Eisenhower, at war's end describing Ultra as having been "decisive" to Allied victory. Sir Harry Hinsley, Bletchley Park veteran and official historian of British Intelligence in World War II, made a similar assessment about Ultra, saying that it shortened the war "by not less than two years and probably by four years"; and that, in the absence of Ultra, it is uncertain how the war would have ended.
Since Ultra was revealed in the middle 1970s, historians have altered the historiography of World War II. For example, Andrew Roberts, writing in the 21st century, states, "Because of the invaluable advantage of being able to read Rommel's Enigma communications, Montgomery knew how short the Germans were of men, ammunition, food and above all fuel. When he put Rommel's picture up in his caravan he wanted to be seen to be almost reading his opponent's mind. In fact he was reading his mail".
There has been controversy about the influence of Allied Enigma decryption on the course of World War II. It has also been suggested that the question should be broadened to include Ultra's influence not only on the war itself, but also on the post-war period.
F. W. Winterbotham, the first author to outline the influence of Enigma decryption on the course of World War II, likewise made the earliest contribution to an appreciation of Ultra's postwar influence, which now continues into the 21st Century — and not only in the postwar establishment of Britain's GCHQ (Government Communication Headquarters) and America's NSA. "Let no one be fooled," Winterbotham admonishes in chapter 3, "by the spate of television films and propaganda which has made the war seem like some great triumphant epic. It was, in fact, a very narrow shave, and the reader may like to ponder [...] whether [...] we might have won [without] Ultra."
Debate continues on whether, had postwar political and military leaders been aware of Ultra's role in Allied victory in World War II, these leaders might have been less optimistic about post-World War II military involvements.
Knightley suggests that Ultra may have contributed to the development of the Cold War. The Soviets received disguised Ultra information, but the existence of Ultra itself was not disclosed by the western Allies. The Soviets, who had clues to Ultra's existence, possibly through Kim Philby and Anthony Blunt, may thus have felt still more distrustful of their wartime partners.
The mystery surrounding the discovery of the sunk U-869 off the coast of New Jersey by divers Richie Kohler and John Chatterton was unraveled in part through the analysis of Ultra intercepts, which demonstrated that, although U-869 had been ordered by U-boat Command to change course and proceed to North Africa, near Rabat, the submarine had missed the messages changing her assignment and had continued to the eastern coast of the U.S., her original destination.
https://en.wikipedia.org/wiki/Ultra

1:35:43

Sharing Secrets: Obstacles and Solutions to International Intelligence Sharing

Newly recruited intelligence officers are taught that there are no friendly intelligence a...

Yuval Noah Harari, the author of Sapiens and Homo Deus, explores the long history of inequality – from the Stone Age onwards – and asks whether we are on the brink of creating a huge “economically useless” underclass, unable to keep up with enhanced humans, the owners of increasingly valuable data and, eventually, artificial intelligence.
April 2017

33:20

HOW ARTIFICIAL INTELLIGENCE CHANGING THE WORLD

SDS 067: Latest Developments in the Field of AI and How it is Changing the World
In this e...

HOW ARTIFICIAL INTELLIGENCE CHANGING THE WORLD

SDS 067: Latest Developments in the Field of AI and How it is Changing the World
In this episode of the SuperDataScience Podcast, I chat with Vice President of Research at Sentient AI, Risto Miikkulainen. You will discuss about the applications of AI across multiple fields, learn about the 2 types of AI - the Evolutionary Algorithms and Reinforcement Learning Algorithms, and also get valuable insights on how AI is changing the employment landscape.
If you enjoyed this episode, check out show notes, resources, and more at http://www.superdatascience.com/67

21:47

Collecting Valuable Deal Intelligence Using ShareVault

Find out how a good Virtual Data Room can provide valuable deal intelligence: http://www.s...

Collecting Valuable Deal Intelligence Using ShareVault

Find out how a good Virtual Data Room can provide valuable deal intelligence: http://www.sharevault.com/product/features
First, a good data room gives you detailed control over who sees which documents:
* Quickly set up specific users and groups and fine-tune access permissions for each (view only, print, or download)
* Place the same document in multiple places in your organizational hierarchy without the need to replicate the document
And second, a good data room provides detailed reports:
* Identify how much time users and groups spend looking at each page of your documents
* Track the path users take through documents in your data room

In a society where brilliance, degrees, and pedigree reign, there is a uniquely human skill set that many don’t know exists, let alone understand or value: Emotional Intelligence. JoelleHadley will teach us what EI is, how valuable it can be in helping us show up as our best selves, and inspire us to spread Emotional Intelligence.
Joelle Hadley is the founder and president of The Culture Coaches, and she is passionate about creating more positive and productive work places where people love their work and love their lives. Her media and leadership career includes 21 years of marketing, sales, and publishing leadership with American City Business Journals, the nation’s largest publisher of weekly business newspapers. Joelle was also the face and voice of local business news on the NBC affiliate KPNX and on KTAR news-talk radio. She is an expert in communication and presentation skills, emotional intelligence, and personal performance. She is a master certified trainer in Emotional Intelligence from the Institute of Health and Human Potential and is also the Co-founder of The Southwest Institute for Emotional Intelligence. Joelle has inspired thousands of executives across the country with her many speeches and workshops centered on corporate culture, personal excellence, and lifestyle along with leadership.
This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx

In this episode of the Waking Up podcast, Sam Harris speaks with Max Tegmark about his new book Life3.0: Being Human in the Age of Artificial Intelligence. They talk about the nature of intelligence, the risks of superhuman AI, a nonbiological definition of life, the substrate independence of minds, the relevance and irrelevance of consciousness for the future of AI, near-term breakthroughs in AI, and other topics.
Max Tegmark is a professor of physics at MIT and the co-founder of the Future of Life Institute. Tegmark has been featured in dozens of science documentaries. He is the author of Our Mathematical Universe and Life 3.0: Being Human in the Age of Artificial Intelligence.
Twitter: @Tegmark
Discuss this in the forums
Do you find the Waking Up podcast valuable?
You can support the show directly at: https://samharris.org/subscribe
Supporters get access to Sam's "Ask Me Anything" episodes, advance tickets to live events, and other exclusive content.
More information at https://www.samharris.org
--
Subscribe to the podcast on YouTube: https://www.youtube.com/user/samharrisorg
Follow Sam on Twitter: https://twitter.com/samharrisorg
Follow Sam on Facebook: https://www.facebook.com/Samharrisorg/

Amir Husain: "The Sentient Machine: The Coming Age...

DEF CON 23 - Michael Schrenk - Applied Intelligen...

PF06g Valuable Brains - Emotional intelligence EQ...

RUSSIAN INTELLIGENCE: KGB Interrogation Methods (7...

Cut fraudulent losses and gather valuable video ba...

Military Intelligence Specialists 1961 US Army Tra...

Ambassador Henry Crumpton - The Art of Intelligen...

FDR's Secret Involvement in Intelligence and Espio...

Sharing Secrets: Obstacles and Solutions to Intern...

Artificial Intelligence Will Create Economically U...

HOW ARTIFICIAL INTELLIGENCE CHANGING THE WORLD...

Collecting Valuable Deal Intelligence Using ShareV...

Emotions are Contagious: Spreading Emotional Intel...

Waking Up with Sam Harris #94 - The Future of Inte...

It turns out that a theory explaining how we might detect parallel universes and prediction for the end of the world was proposed and completed by physicist Stephen Hawking shortly before he died ... &nbsp;. According to reports, the work predicts that the universe would eventually end when stars run out of energy ... ....

Article by WN.Com Correspondent Dallas DarlingIt wasn’t very long ago Republicans were accusing Democrats of either paying a few dollars to the homeless for votes or giving them a pack of cigarettes. But with Donald Trump, it’s obvious he paid $130,000 to an adult-film star in exchange for her silence last October and just before the general election ... Was the payment from his own account – or from a lawyer – or from campaign donations....

Using e-cigarettes may lead to an accumulation of fat in the liver, a study of mice exposed to the devices suggests. “The popularity of electronic cigarettes has been rapidly increasing in part because of advertisements that they are safer than conventional cigarettes ... Friedman of Charles R. Drew University of Medicine and Science in Los Angeles, California ... Circadian rhythm dysfunction is known to accelerate liver disease....

search tools

You can search using any combination of the items listed below.

The service companies that map underground pockets of oil, drill the wells and lift crude from miles below are generating vast new amounts of data they never before realized could be valuable... and now helps oil companies use artificial intelligence to make better wells ... "Data is king and one of our most valuable resources," Sandeep Bhakhri, chief information and technology officer at EOG told investors on a conference call last year....

The 'Where Is The Love?' hitmaker is single and has no children, but insists his legacy is about more than passing down his genes because his work in technology and the scholarship programme he set up in the Los Angeles neighbourhood where he grew up is far more valuable to the future ... and artificial intelligence trying to make a better future....

This is driven by the increasing importance of data-driven decision making and self-service business intelligence (BI) tools ... Here users have a greater ability to analyze, visualize and leverage business intelligence and other tools, all of which have become the foundation to power data processes ... #MachineLearning #AI #Intelligence #LearningSpeed....

Amazon.com's (NASDAQ...True to form, Amazon kept those numbers close to the vest, but Reuters recently obtained internal documents that provide details on just how valuable Amazon's original TV shows are to the online retail giant ... Other originals weren't nearly as successful ... subscribers Consumer Intelligence Research Partners estimated in April last year ... That makes the incremental revenue from PrimeVideo viewers increasingly valuable....

Artificial intelligence is one technology that many enterprises have implemented to solve these internal challenges. In fact, IDC forecasts worldwide spending on cognitive and artificial intelligence (AI) systems to reach $57.6 billion in 202 ... Such an airline would have turned the inputs of its employees and customers into a valuable asset for management....

For small businesses looking to get bigger, quality marketing can be the most valuable tool there is, and there’s AI to help you out in that regard as well. High-powered marketing solutions are within reach with platforms such as Acquisio and Bookmark that apply artificial intelligence to constructing targeted consumer messaging....

More ... But he cast doubt on intelligence disclosed by Boris Johnson that Russia has stockpiled Novichok, the substance thought to have been used in the attack, within the past decade and has been investigating using nerve agents for assassinations ...Alex Salmond during the launch of his RT chat show The Alex Salmond ShowCredit. PA. More ... “Alex is a private individual ... However, Mr Blackford said she played a “very valuable role” in the SNP ... ....

Gree, a major Chinesehome appliance maker, is ramping up efforts in intelligent manufacturing by setting up unmanned factories and using industrial robots in a variety of production cycles, as part of its broader push to upgrade the country's manufacturing industry ...Dong, who is a deputy to the NPC, said Gree entered into the intelligent equipment industry in 2013....

SMEs in innovation sector may shine, but growth stocks retain allure for investors ... "The country's policy is to rejuvenate the economy through emphasis on science and technology ... At the beginning of this month, the China Securities Regulatory Commission decided to fast-track approvals for IPO applications of valuable startups in four areas (biotechnology, cloud computing, artificial intelligence and advance manufacturing) ... ....

Infiniti Research, a world-renowned market intelligence solutions provider, has announced the completion of their latest list blog on the top trends in the logistics industry for the year 2018 ... Infiniti Research is a global market intelligence company presenting market insights to help look beyond market disruptions, study competitive activity, and develop intelligent business strategies....